H



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

h2h (hop-to-hop) architectures
     ACL
     constrained routing
     IP tunnels, VPN QoS models
     Layer 2 solutions
         complexity of
         scalability of
         user groups
         VLAN 2nd
     Layer 3 solutions
         ACL
         adding interfaces to VRF
         advantages of
         complexity
         converting core links to dotlq trunks
         creating VLAN
         creating VRF
         EIGRP address families
         hierarchy support
         network topologies
         PBR
         routed nodes
         scalability
         segmented campus networks
         static routing
         VLAN ID, creating for core data path virtualization
         VRF, assigning SVI to
         VRF-lite
     MTR
     PBR
headers
     GRE
     IPsec
hierarchical campus design (scalable enterprise networks)
     access switches
     distribution switches
     equal-cost paths
     failure-isolation features
     failures, effects of
     IGP
     Layer 2 (switched) connectivity
     Layer 3 (routed) technologies
     network layers, collapsing
     topology designs
     VLAN
     VPN
hierarchical QoS (Quality of Service)
hierarchical WAN architecture
HIPAA (Health Insurance Portability and Accountability Act), security controls
hub-and-spoke policy-based segmentation
hub-and-spoke topologies
     peer-based L3VPN architectures
     scalable enterprise network design
     tunnel-based L3VPN architectures
hub-and-spoke VPN, unprotected shared services




Network Virtualization
Network Virtualization
ISBN: 1587052482
EAN: 2147483647
Year: 2006
Pages: 128

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net